The structure of applied security in exploiting the Internet
In recent decades, the world has witnessed remarkable changes in the areas of technology, especially ICT, and , these changes have transformed the reality of the individual and social life and created a great deal of dependence. Today, there is no doubt that ensuring the security of information infrastructures and IT equipment in organizations is a key to the opportunities ahead. The key issue in using this network is the uncertainty of the Internet environment and the vulnerability and the possibility of penetration and impact by threat agents in this context, and because the rules of the game on the Internet have been developed by the dominant and leading countries in the field of information and communication technology. We need to be involved in this structure and play a role; So the issue we are facing is the health of this presence and exploitation of this platform. Therefore, the main concern of the researchers in this study is to respond to this question: "What is the structure of applied security in exploiting the Internet?".This is a Quantitative research in which the descriptive-analytic methodology was used. a questionnaire was used to collect information. The sample size was 45 people and a researcher-made questionnaire distributed among security and intelligence experts. The SPSS software was used to record and analyze statistical data. Research findings confirm the hypothesis and the results indicate that in order to deal with the security threats of the Internet network, a combination of preventive, defensive and aggressive measures is required, which is presented in the form of an applied security structure.
- حق عضویت دریافتی صرف حمایت از نشریات عضو و نگهداری، تکمیل و توسعه مگیران میشود.
- پرداخت حق اشتراک و دانلود مقالات اجازه بازنشر آن در سایر رسانههای چاپی و دیجیتال را به کاربر نمیدهد.